Login / Signup
Using identity-based cryptography in mobile applications.
V. Mora-Afonso
Pino Caballero-Gil
Published in:
CoRR (2022)
Keyphrases
</>
mobile applications
identity based cryptography
key management
mobile devices
user experience
ad hoc networks
smart phones
context aware
mobile phone
bilinear pairings
end users
digital signature
signcryption scheme
key distribution
mobile apps
access control
provably secure
wireless sensor networks